000 07434cam a2200733Mi 4500
001 ocn942677380
003 OCoLC
005 20190328114813.0
006 m o d
007 cr |n|||||||||
008 151207t20162016mauad ob 000 0 eng d
040 _aVT2
_beng
_epn
_cVT2
_dOCLCO
_dOCLCQ
_dEBLCP
_dIDEBK
_dOPELS
_dYDXCP
_dN$T
_dDEBSZ
_dREB
_dOCLCF
_dCDX
_dIDB
_dOCLCQ
_dMERUC
_dOCLCQ
_dVT2
_dU3W
_dNLE
_dD6H
_dUAB
_dWRM
_dEZ9
_dOCLCQ
_dLOA
_dZCU
_dICG
_dCOCUF
_dDKC
019 _a927963546
_a928714010
_a936300055
_a957641006
020 _a9780128053799
_q(e-book)
020 _a0128053798
_q(e-book)
020 _z9780128053676
020 _z0128053674
035 _a(OCoLC)942677380
_z(OCoLC)927963546
_z(OCoLC)928714010
_z(OCoLC)936300055
_z(OCoLC)957641006
050 4 _aTK5105.55
072 7 _aCOM
_x013000
_2bisacsh
072 7 _aCOM
_x014000
_2bisacsh
072 7 _aCOM
_x018000
_2bisacsh
072 7 _aCOM
_x067000
_2bisacsh
072 7 _aCOM
_x032000
_2bisacsh
072 7 _aCOM
_x037000
_2bisacsh
072 7 _aCOM
_x052000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aFazeldehkordi, Elahe.
245 1 2 _aA study of black hole attack solutions : on AODV routing protocol in MANET /
_h[electronic resource]
_cElahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi, University of Malaya, Kuala Lumpur, Malaysia ; Matthew Neely, technical editor.
260 _aWaltham, MA :
_bElsevier,
_c2016.
300 _a1 online resource (124 pages) :
_billustrations (some color).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 0 _aSyngress advanced topics in information security
504 _aIncludes bibliographical references.
588 0 _aOnline resource; title from PDF title page (ebrary, viewed December 7, 2015).
505 0 _aFront Cover; A Study of Black Hole Attack Solutions; Copyright Page; Contents; List of Tables; List of Figures; Preface; 1 Introduction; 1.1 Introduction; 1.2 Problem Background; 1.3 Problem Statement; 1.4 Intent of Study; 1.5 Aims; 1.6 Scope; 1.7 The Significance of the Book; 1.8 Organization of the Book; 2 Literature Review; 2.1 Introduction; 2.2 Network; 2.3 Wired Networks; 2.4 Why Wireless Networks?; 2.5 Wireless Networks; 2.5.1 IEEE Standard for Wireless Networks; 2.5.2 Categorization of Wireless Networks; 2.5.2.1 Infrastructure Networks; 2.5.2.2 Infrastructure-Less Networks.
505 8 _a2.5.3 Benefits of Wireless Networks2.5.4 Weaknesses of Wireless Networks; 2.6 Ad Hoc Networks; 2.6.1 Static Ad Hoc Networks; 2.6.2 Mobile Ad Hoc Networks (MANETs); 2.6.2.1 Categorization of MANETs; 2.6.2.1.1 Vehicular Ad hoc Networks (VANETs); 2.6.2.1.2 Intelligent Vehicular Ad hoc Networks (InVANETs); 2.6.2.1.3 Internet-Based MANETs (IMANETs); 2.6.2.2 Features of MANET; 2.6.2.3 Utilization of MANET; 2.6.2.4 Benefits of MANET; 2.6.2.5 Weaknesses of MANET; 2.7 Routing; 2.8 Ad Hoc Network Routing Protocols; 2.9 MANETs Routing Protocols; 2.9.1 Categorization of Routing Protocols.
505 8 _a2.9.1.1 Table-Driven (Proactive) Routing2.9.1.2 Reactive (On-Demand) Routing; 2.9.1.3 Hybrid Routing; 2.10 Optimized Link State Routing Protocol (OLSR); 2.10.1 OLSR Working; 2.10.1.1 Multipoint Relaying (MPR); 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV); 2.11.1 Routing in AODV; 2.11.1.1 Route Discovery Mechanism in AODV; 2.11.1.2 Route Maintenance Mechanism in AODV; 2.11.2 Features of AODV; 2.11.3 Benefits and Weaknesses of AODV; 2.12 Dynamic Source Routing Protocol (DSR); 2.12.1 Route Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs.
505 8 _a2.13.1 Categorizations of MANET Attacks2.13.2 Black Hole Attack in MANETs; 2.13.3 Black Hole Attack in AODV; 2.13.4 Black Hole Attack in OLSR; 2.13.5 Other Attacks in MANETs; 2.13.5.1 Gray Hole Attack; 2.13.5.2 Flooding Attack; 2.13.5.3 Selfish Node; 2.13.5.4 Wormhole Attack; 2.13.5.5 Sleep Deprivation Torture Attack; 2.13.5.6 Jellyfish Attack; 2.13.5.7 Modification Attack; 2.13.5.8 Misrouting Attack; 2.13.5.9 Impersonation Attack; 2.13.5.10 Routing Table Overflow Attack; 2.14 Related Studies; 2.15 Investigated Solutions; 2.16 Intrusion Detection System (IDSAODV); 2.17 Evaluation Metrics.
505 8 _a2.18 Summary3 Research Methodology; 3.1 Introduction; 3.2 Research Structure; 3.2.1 Phase 1: Investigating the Existing Solutions; 3.2.2 Phase 2; 3.2.2.1 Phase 2a: Clarifying Efficient Solution; 3.2.2.2 Phase 2b: Executing the Existed Solution; 3.2.2.2.1 Simulation: The Customary Definition; 3.2.2.2.2 Network Simulator (NS); 3.2.2.2.3 Tool Command Language (Tcl) in NS; 3.2.3 Phase 3: Comparing the Effects of Recommended Solution on MANET Performance; 3.3 Summary; 4 Investigation and Selection Procedure; 4.1 Introduction.
520 8 _aAnnotation
_bMobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETsExplains the significance behind the need of wireless networks and MANET securityUnderstand MANET routing protocols, namely the ADOV method.
650 0 _aAd hoc networks (Computer networks)
650 0 _aRouting protocols (Computer network protocols)
650 0 _aComputer networks
_xSecurity measures.
650 7 _aCOMPUTERS
_xComputer Literacy.
_2bisacsh
650 7 _aCOMPUTERS
_xComputer Science.
_2bisacsh
650 7 _aCOMPUTERS
_xData Processing.
_2bisacsh
650 7 _aCOMPUTERS
_xHardware
_xGeneral.
_2bisacsh
650 7 _aCOMPUTERS
_xInformation Technology.
_2bisacsh
650 7 _aCOMPUTERS
_xMachine Theory.
_2bisacsh
650 7 _aCOMPUTERS
_xReference.
_2bisacsh
650 7 _aAd hoc networks (Computer networks)
_2fast
_0(OCoLC)fst01743246
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aRouting protocols (Computer network protocols)
_2fast
_0(OCoLC)fst01743529
655 4 _aElectronic books.
655 7 _aElectronic books.
_2lcgft
700 1 _aAmiri, Iraj Sadegh.
700 1 _aAkanbi, Oluwatobi Ayodeji.
700 1 _aNeely, Matthew.
776 0 8 _iPrint version:
_aFazeldehkordi, Elahe.
_tA Study of Black Hole Attack Solutions : On AODV Routing Protocol in MANET.
_d: Elsevier Science, �2015
_z9780128053676
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128053676
999 _c247214
_d247214